Security big data analysis system and method based on dynamic health degree model

A technology for analyzing system and health, which is applied in the field of big data analysis to achieve the effect of improving security

Active Publication Date: 2016-06-01
NSOC INFORMATION TECH CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The core problem of the status quo is that it is impossible to accurately locate the small-probability sec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security big data analysis system and method based on dynamic health degree model
  • Security big data analysis system and method based on dynamic health degree model
  • Security big data analysis system and method based on dynamic health degree model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] see figure 1 , the present invention discloses a security big data analysis system and method based on a dynamic health model, the system includes a terminal log data module 1, a network data module 2, an application data module 3, and a behavior and operation data module 4 , Mass security big data collector module 5, independent data set archive module 6, establish health model and form dynamic digital signature module 7, daily security data analyzer module 8, calculation module 9, alarm module 10, dynamic health model module 11.

[0068] The terminal log data module 1, the network data module 2, the application data module 3, and the behavior and operation data module 4 are used to collect massive security big data from various network objects and collect them into the big data collector.

[0069] The mass security big data collector module 5 is used to collect and classify the security big data collected from the terminal log data module 1, the network data module 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a security big data analysis system and method based on a dynamic health degree model. The security big data analysis system comprises a big data acquisition device module, an independent data set archive module , a modeling and signature module, a daily security data analyzer module, a calculating module, an alarm module and a dynamic health degree model module; wherein the calculating module is used for obtaining corresponding data from the daily security data analyzer module and the modeling and signature module, and performing calculation through a virtual processor according to comparison of threshold values; the alarm module is used for judging whether to output an alarm according to a value calculated by the calculating module; and the independent data set archive module and the modeling and signature module are used for forming the dynamic health degree model module. The system and the method can accurately locate a small-probability key asset security event from big data flow waveforms, thereby improving security of data.

Description

technical field [0001] The invention belongs to the technical field of big data analysis, and relates to a big data analysis system, in particular to a safety big data analysis system based on a dynamic health model; at the same time, the invention also relates to a safety big data analysis system based on a dynamic health model Analytical method. Background technique [0002] In the current cloud era, in order to constantly respond to new security challenges, enterprise users continue to deploy various security products such as antivirus systems, firewalls, intrusion detection systems, vulnerability scanning systems, UTM, SOC, etc. These complex IT resources and Its security defense facilities, including network equipment, systems and applications, continuously generate a large number of logs and security events during operation. The resulting situation is: due to the high false positive rate and data volume of massive alarm data (logs, events, alarm information, etc.) in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06Q10/06
Inventor 张鹏施向阳
Owner NSOC INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products